日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當(dāng)前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

Part 2 – Deep analysis using Androguard tools

發(fā)布時(shí)間:2025/3/15 编程问答 24 豆豆
生活随笔 收集整理的這篇文章主要介紹了 Part 2 – Deep analysis using Androguard tools 小編覺得挺不錯(cuò)的,現(xiàn)在分享給大家,幫大家做個(gè)參考.

Welcome to the second part of this series on “Reverse Engineering android applications”. To read an overview of the series, refer to the?serious announcement blog post.

In?first part, we learnt how to install Androguard and basic commands to decompile and analyse the apk. In this part, we will check some more features of Androguard and will see in deep analysis and will perform more Reverse Engineering on an APK.

We will explore and talk about usage of below tools in this part:

  • Androaxml
  • Androsim
  • Androdd
  • Apkviewer
  • Androapkinfo

1. Androaxml

Viewing AndroidManifest.xml is most important part of reverse engineering. Using Androaxml tool of Androguard, we can easily fetch the AndroidManifest.xml file. It actually converts android’s binary XML (i.e. AndroidManifest.xml file) into the classic XML file, that is human readable.

Simply run this command:

1 ./androaxml.py -i <path_of_apk>? -o <name_of_output_file> </code>

In our case, we have RTU-info.apk and output.xml will be output file generated, contains Manifest.xml.

1 ./androaxml.py -i RTU-Info.apk? -o output.xml

This is our output.xml file:

2. Androsim

To compare two apk files
Comparing genuine applications and modified applications containing malware is a also a part of Reverse Engineering. Let’s explore how we can compare two apk files, using Androsim script that comes out of box from Androguard.

So the purpose of this tool is to get the similarities between two applications.

Prerequisites of Androsim:

  • For Windows?Directly download executable file?Androsim.exe?and run this tool to compare.
  • For Linux?users, make sure this packages are installed in your system.
    • sparsehash
    • muparser
    • snappy
    • bzip2
    • zlib

For Windows:
In case of windows user, after downloading, navigate to the folder containing androsim.exe and run this command:

1 androsim.exe -i <path_of_first_apk> <path_of_second_apk> -c ZLIB -n

In this case, we have used two apk files of circle.apk & circle1.apk and both are in same folder as androsim.exe:

1 androsim.exe -i circle.apk circle1.apk -c ZLIB -n

For Linux:
In case of Linux users, navigate to androguard folder and run this command to check similarities between two apks: Circle and Circle1

1 python androsim.py -i circle.apk circle1.apk -c ZLIB -n

This tool helps to detected Identical, Similar, New, Deleted, Skipped methods. And also score from 0 to 10 scale is shown showing % of similarities.

  • -c specifies the type of compressor (BZ2, ZLIB, SNAPPY, LZMA, XZ).
  • -d can be used to display methods name as output.
1 python androsim.py -i circle.apk circle1.apk -c ZLIB -n -d

3. Androdd

Dump all methods of all class files in an Android Package

To dump graphical outputs of all methods of all the classes in an android package, we use Androdd.py tool which comes out of box in Androguard.

Prerequisites of Androdd:

For windows/Linux, make sure this package is installed in your system.

  • pydot

Navigate to Androguard folder and run androdd.py file with input file and output folder arguments.

1 ./androdd.py -i <path_of_apk> -o <path_of_output_directory>

In this tutorial we have “circle.apk” a demo input app and “dd” as output directory.

1 python androdd.py -i circle2.apk -o ./dd

OR

1 ./androdd.py -i circle2.apk -o ./dd

Now check out dd directory, graphical output of all methods will be generated as a .ag file, along with all java files. If we want output graphics file in .png format, just pass -f png as argument.

1 python androdd.py -i circle2.apk -o ./dd -f png

OR

1 ./androdd.py -i circle2.apk -o ./dd -f png

This is sample graphical file that shows all methods of a class Main

4. Apkviewer

To iew control flow in terms of mathematical graphs

GraphML is an XML format, used to display mathematical graphs and nodes. More about GraphML can be found on?Openthefile.

Download?Gephi?or?yED?to view GraphML generated by ApkViewer tool.

Prerequisites of APKViewer:
Make sure this packages are installed in your system.

  • NetworkX
1 python apkviewer -i <path_of_first_apk> -o <path_to_output_folder>

We have RTU-info as input app and viewer as output directory to store all generated GraphML files.

1 python apkviewer -i RTU-info.apk -o viewer

Inside the output folder, we will find 2 GraphML files, open those files in Graph Editor. You can open “methodcalls.graphml” in yED graph Editor. It shows all method calls in a graphical way.

5. Androapkinfo

Displays complete information about apk file

Androapkinfo displays Files, Permissions, Main Activity, All Activities, Services, Obfuscation related information at once! This tool is same as the Androlyze tool, for which we talked about in?Part 1, provided this displays all information at one go!

1 python androapkinfo.py -i <path_of_first_apk>

OR

1 ./androapkinfo.py -i <path_of_first_apk>

In Summary

This bring us to the end of this part and this bring us to the completion of the tutorial on Androguard. In this part, we explored about the usage of different tools of Androguard like Androaxml, Androsim(To compare two apk files), Androdd(Dump all methods of all class files in an Android Package), Apkviewer (To iew control flow in terms of mathematical graphs) and Androapkinfo.

We shall talk about reverse engineering using other tools in?next part. Till than play with Androguard and perform reverse engineering on some of the malicious APKs. See you in next part!


總結(jié)

以上是生活随笔為你收集整理的Part 2 – Deep analysis using Androguard tools的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網(wǎng)站內(nèi)容還不錯(cuò),歡迎將生活随笔推薦給好友。

主站蜘蛛池模板: 亚洲精品中文字幕乱码三区91 | 久久久久久久久成人 | 欧美h视频在线观看 | av的天堂| 双女主黄文 | 日韩成人性视频 | 久久久久亚洲精品 | 国产麻豆剧果冻传媒白晶晶 | a国产在线 | 亚洲一区欧洲一区 | 亚洲欧美激情视频 | 日韩在线精品视频一区二区涩爱 | 男男黄色片 | 人妻 日韩 欧美 综合 制服 | 夜夜添无码一区二区三区 | 亚洲精品视频国产 | 日韩视频在线免费观看 | 国产视频一二三 | 亚洲逼| 啪一啪在线 | 丰满人妻一区二区 | 黄色不打码视频 | 热久久精| 毛片无码一区二区三区a片视频 | 国精产品乱码一区一区三区四区 | 中文字幕美女 | 亚洲 高清 成人 动漫 | 久久亚洲精精品中文字幕早川悠里 | 伊人网视频在线 | 妞干网这里只有精品 | 亚洲看片网站 | 天天尻 | 快播色图| 九九九精品视频 | 黄色a∨| 成年女人免费视频 | www.精品一区 | 国产伦精品一区二区三 | 欧美激情小视频 | 国内毛片毛片毛片 | 成人传媒 | 91不卡在线 | 少妇视频在线观看 | 成人在线免费 | 精品少妇av | 伊人久久大香线蕉av色婷婷色 | 欧美50p| 欧美在线观看一区二区 | 国产特级黄色片 | 国产男女猛烈无遮挡免费视频 | 亚洲欧洲av | 欧美激情亚洲色图 | 免费观看亚洲 | 9999re| 欧美成人二区 | 我的公把我弄高潮了视频 | 秋霞99| 伊人精品视频在线观看 | 日噜噜夜噜噜 | 亚色视频在线观看 | 精品久久二区 | 九九色| 亚洲日本久久 | 777午夜| 国产精品国产三级国产专播品爱网 | 91av亚洲| 免费a大片 | 超碰免费av | 中国人妖和人妖做爰 | 成人免费区一区二区三区 | 91色在线 | 羞羞动漫免费观看 | 久久中文精品 | 久久国产精品精品国产色婷婷 | 国产精品香蕉国产 | 色偷偷人人澡人人爽人人模 | 国产精品成人在线观看 | www日本www| 亚洲激情片 | 青青艹av | 男女激情实录 | 日韩av大片在线观看 | 国产成人在线观看免费 | 少妇高潮灌满白浆毛片免费看 | 成人免费公开视频 | 少妇一级淫免费观看 | 欧美日韩国产传媒 | 亚洲av无码乱码在线观看富二代 | 欧美三级特黄 | 就爱啪啪网| 手机在线看片你懂的 | 熟女高潮一区二区三区视频 | 无码人妻精品一区二区三区9厂 | 中文字幕视频一区二区 | 亚洲第8页 | 在线播放你懂得 | 五月天婷婷激情 | 制服av网| 午夜久久久久久 |